Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2m33-w232-qf59

Опубликовано: 04 дек. 2025
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

Input: imx_sc_key - fix memory corruption on unload

This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

In the Linux kernel, the following vulnerability has been resolved:

Input: imx_sc_key - fix memory corruption on unload

This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

msrc
2 месяца назад

Input: imx_sc_key - fix memory corruption on unload

debian
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: I ...

CVSS3: 5.5
fstec
3 месяца назад

Уязвимость функции imx_sc_key_action() модуля drivers/input/keyboard/imx_sc_key.c драйвера клавиш системного контроллера imx_sc_key ядра операционной системы Linux, позволяющая нарушителю повредить память

EPSS

Процентиль: 16%
0.00051
Низкий